![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design
Covers different technologies like AI, IoT and Signal Processing in the context of biomedical applications Reviews medical image analysis, disease detection, and prediction Comprehends the advantage of recent technologies for medical record keeping through electronics health records (EHRs) Presents state of art research in the field of biomedical engineering using various physiological signals Explores different Bio Sensors used in Healthcare Applications using IoT
Parallel Language and Compiler Research in Japan offers the international community an opportunity to learn in-depth about key Japanese research efforts in the particular software domains of parallel programming and parallelizing compilers. These are important topics that strongly bear on the effectiveness and affordability of high performance computing systems. The chapters of this book convey a comprehensive and current depiction of leading edge research efforts in Japan that focus on parallel software design, development, and optimization that could be obtained only through direct and personal interaction with the researchers themselves.
Navigation Design and SEO for Content-Intensive Websites: A Guide for an Efficient Digital Communication presents the characteristics and principal guidelines for the analysis and design of efficient navigation and information access systems on content-intensive websites, such as magazines and other media publications. Furthermore, the book aims to present the tools of information processing, including information architecture (IA) and content categorization systems, so that such designs can ensure a good navigation experience based on the semantic relations between content items. The book also presents best practices in the design of information access systems with regard to their main structures, including search query forms and search result pages. Finally, the book describes the foundations of search engine optimization (SEO), emphasizing SEO oriented to publications focused on communication and the coverage of current affairs, including images and videos.
Big Data: Principles and Paradigms captures the state-of-the-art research on the architectural aspects, technologies, and applications of Big Data. The book identifies potential future directions and technologies that facilitate insight into numerous scientific, business, and consumer applications. To help realize Big Data's full potential, the book addresses numerous challenges, offering the conceptual and technological solutions for tackling them. These challenges include life-cycle data management, large-scale storage, flexible processing infrastructure, data modeling, scalable machine learning, data analysis algorithms, sampling techniques, and privacy and ethical issues.
Addressing Cybersecurity through the lens of a war-time set of varying battlefields is unique. Tying those to Zero Trust is also unique. It has that unique POV that hasn't been covered before combined with a highly credible view of and explanation of Zero Trust.
Addressing Cybersecurity through the lens of a war-time set of varying battlefields is unique. Tying those to Zero Trust is also unique. It has that unique POV that hasn't been covered before combined with a highly credible view of and explanation of Zero Trust.
This book introduces Open Core Protocol (OCP) not as a conventional hardware communications protocol but as a meta-protocol: a means for describing and capturing the communications requirements of an IP core, and mapping them to a specific set of signals with known semantics. Readers will learn the capabilities of OCP as a semiconductor hardware interface specification that allows different System-On-Chip (SoC) cores to communicate. The OCP methodology presented enables intellectual property designers to design core interfaces in standard ways. This facilitates reusing OCP-compliant cores across multiple SoC designs which, in turn, drastically reduces design times, support costs, and overall cost for electronics/SoCs."
This book provides insights into contemporary issues and challenges in multi-criteria decision models. It is a useful guide for identifying, understanding and categorising multi-criteria decision models, and ultimately implementing the analysis for effective decision-making. The use of multi-criteria decision models in software reliability engineering is a relatively new field of study, and this book collects all the latest methodologies, tools and techniques in one single volume. It covers model selection, assessment, resource allocation, release management, up-grade planning, open-source systems, bug tracking system management and defect prediction. Multi-Criteria Decision Models in Software Reliability: Methods and Applications will cater to researchers, academicians, post-graduate students, software developers, software reliability engineers and IT managers.
Exploring new trends in computer technology, Corporal introduces an innovative and exciting concept: Transport Triggered Architecture (TTAs). Unlike most traditional architectures, where programmed operations trigger internal data transports, TTAs function through programming the data transports themselves. As a result the new architecture alleviates bottlenecks, allows for new code-generation optimizations and exploits hardware more efficiently. Founded on the author’s recent research, this book evaluates the attributes of different classes of architectures. It demonstrates how TTAs can be used as a template for automatic generation of application-specific processors and highlights their suitability for embedded system design. Several commercial TTA implementations have proven its concepts and advantages. Features includes:
Microprocessor Architectures is cutting-edge text which will prove invaluable to both industrial hardware and software engineers involved in embedded system design and to postgraduate electrical engineering and computer science students. This clearly-structured reference demonstrates the versatility of TTAs and explores their influential role in the next generation of computer architecture.
Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals. In particular, it explores the physical nature of information security risk, and in so doing exposes subtle, yet revealing, connections between information security, physical security, information technology, and information theory. This book is also a practical risk management guide, as it explains the fundamental scientific principles that are directly relevant to information security, specifies a structured methodology to evaluate a host of threats and attack vectors, identifies unique metrics that point to root causes of technology risk, and enables estimates of the effectiveness of risk mitigation. This book is the definitive reference for scientists and engineers with no background in security, and is ideal for security analysts and practitioners who lack scientific training. Importantly, it provides security professionals with the tools to prioritize information security controls and thereby develop cost-effective risk management strategies.
1. Understand the audit culture, challenges, and benefits of the CAE role in digitally transforming business environment in smart cities 2. Identify ways to advance the value of Internal Audit in digital era 3. Use and control the resources of the city efficiently, and to ensure that the system units work properly in an integrated way.
Unique selling point: The Internet of Things (IoT), AI, and analytics are studied on how they can combat pandemics Core audience: Researchers and medical informatics professionals Place in the market: Academic reference title on timely topic also appealing to professionals
The COVID-19 pandemic upended the lives of many and taught us the critical importance of taking care of one's health and wellness. Technological advances, coupled with advances in healthcare, has enabled the widespread growth of a new area called mobile health or mHealth that has completely revolutionized how people envision healthcare today. Just as smartphones and tablet computers are rapidly becoming the dominant consumer computer platforms, mHealth technology is emerging as an integral part of consumer health and wellness management regimes. The aim of this book is to inform readers about the this relatively modern technology, from its history and evolution to the current state-of-the-art research developments and the underlying challenges related to privacy and security issues. The book's intended audience includes individuals interested in learning about mHealth and its contemporary applications, from students to researchers and practitioners working in this field. Both undergraduate and graduate students enrolled in college-level healthcare courses will find this book to be an especially useful companion and will be able to discover and explore novel research directions that will further enrich the field.
The COVID-19 pandemic upended the lives of many and taught us the critical importance of taking care of one's health and wellness. Technological advances, coupled with advances in healthcare, has enabled the widespread growth of a new area called mobile health or mHealth that has completely revolutionized how people envision healthcare today. Just as smartphones and tablet computers are rapidly becoming the dominant consumer computer platforms, mHealth technology is emerging as an integral part of consumer health and wellness management regimes. The aim of this book is to inform readers about the this relatively modern technology, from its history and evolution to the current state-of-the-art research developments and the underlying challenges related to privacy and security issues. The book's intended audience includes individuals interested in learning about mHealth and its contemporary applications, from students to researchers and practitioners working in this field. Both undergraduate and graduate students enrolled in college-level healthcare courses will find this book to be an especially useful companion and will be able to discover and explore novel research directions that will further enrich the field.
1. Understand the audit culture, challenges, and benefits of the CAE role in digitally transforming business environment in smart cities 2. Identify ways to advance the value of Internal Audit in digital era 3. Use and control the resources of the city efficiently, and to ensure that the system units work properly in an integrated way.
The idea behind this book is to simplify the journey of aspiring readers and researchers to understand the convergence of Big Data with the Cloud. This book presents the latest information on the adaptation and implementation of Big Data technologies in various cloud domains and Industry 4.0. Synergistic Interaction of Big Data with Cloud Computing for Industry 4.0 discusses how to develop adaptive, robust, scalable, and reliable applications that can be used in solutions for day-to-day problems. It focuses on the two frontiers - Big Data and Cloud Computing - and reviews the advantages and consequences of utilizing Cloud Computing to tackle Big Data issues within the manufacturing and production sector as part of Industry 4.0. The book unites some of the top Big Data experts throughout the world who contribute their knowledge and expertise on the different aspects, approaches, and concepts related to new technologies and novel findings. Based on the latest technologies, the book offers case studies and covers the major challenges, issues, and advances in Big Data and Cloud Computing for Industry 4.0. By exploring the basic and high-level concepts, this book serves as a guide for those in the industry, while also helping beginners and more advanced learners understand both basic and more complex aspects of the synergy between Big Data and Cloud Computing.
Discusses the requirements and establishment of a layered protocol architecture. Highlights the importance of cable media in getting a high-speed network. Covers the fundamental concepts and advanced topics such as metro ethernet, and ethernet first mile in the field of networking. Presents important topics such as multiprotocol label switching, cloud computing in networking, and the internet of things. Explores the necessity of software-defined networking and network functions virtualization.
Unique selling point: * Provides IT managers and audit professionals with relevant knowledge directly applicable to various blockchain-related organizational projects. Core audience: * An educational and professional reference resource for information systems researchers, IT managers, and audit professionals. Place in the market: * Unlike most current blockchain titles on the market, The Auditor's Guide to Blockchain Technology also deals with security and assurance issues
Unique selling point: * Provides IT managers and audit professionals with relevant knowledge directly applicable to various blockchain-related organizational projects. Core audience: * An educational and professional reference resource for information systems researchers, IT managers, and audit professionals. Place in the market: * Unlike most current blockchain titles on the market, The Auditor's Guide to Blockchain Technology also deals with security and assurance issues
This book presents the state-of-the-art and breakthrough innovations in design automation for cyber-physical systems.The authors discuss various aspects of cyber-physical systems design, including modeling, co-design, optimization, tools, formal methods, validation, verification, and case studies. Coverage includes a survey of the various existing cyber-physical systems functional design methodologies and related tools will provide the reader unique insights into the conceptual design of cyber-physical systems.
Internet of Things and the Law: Legal Strategies for Consumer-Centric Smart Technologies is the most comprehensive and up-to-date analysis of the legal issues in the Internet of Things (IoT). For decades, the decreasing importance of tangible wealth and power - and the increasing significance of their disembodied counterparts - has been the subject of much legal research. For some time now, legal scholars have grappled with how laws drafted for tangible property and predigital 'offline' technologies can cope with dematerialisation, digitalisation, and the internet. As dematerialisation continues, this book aims to illuminate the opposite movement: rematerialisation, namely, the return of data, knowledge, and power within a physical 'smart' world. This development frames the book's central question: can the law steer rematerialisation in a human-centric and socially just direction? To answer it, the book focuses on the IoT, the sociotechnological phenomenon that is primarily responsible for this shift. After a thorough analysis of how existing laws can be interpreted to empower IoT end users, Noto La Diega leaves us with the fundamental question of what happens when the law fails us and concludes with a call for collective resistance against 'smart' capitalism.
Provides an introductory level discussion that covers the functions and architectures of the switch/router Focuses on the fundamental concepts that underline the design of switch/routers in general Explains how a routing protocol uses a routing metric to select the best path to a network destination when multiple paths exist Discusses in greater detail the various design methods, and the well-known architectures associated with switch/routers Provides example architectures that illustrate how real-world switch/routers are designed
Discusses the design goals and key features switch/router manufacturers consider when designing their products Explains the design and architectural considerations, as well as the typical processes and steps used to build practical switch/routers Describes the components of a switch/router that are used in configuring, managing, and monitoring it Discusses the advantages of using Ethernet in today's networks and why Ethernet continues to play a bigger role in Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN) design Describes typical networking applications of switch/routers, particularly, in enterprise and Internet service provider (ISP) networks
Provides an introductory level discussion that covers the functions and architectures of the switch/router Focuses on the fundamental concepts that underline the design of switch/routers in general Explains how a routing protocol uses a routing metric to select the best path to a network destination when multiple paths exist Discusses in greater detail the various design methods, and the well-known architectures associated with switch/routers Provides example architectures that illustrate how real-world switch/routers are designed
This book provides an essential overview of IoT, energy-efficient topology control protocols, motivation, and challenges for topology control for Wireless Sensor Networks, and the scope of the research in the domain of IoT. Further, it discusses the different design issues of topology control and energy models for IoT applications, different types of simulators with their advantages and disadvantages. It also discusses extensive simulation results and comparative analysis for various algorithms. The key point of this book is to present a solution to minimize energy and extend the lifetime of IoT networks using optimization methods to improve the performance. Features: Describes various facets necessary for energy optimization in IoT domain. Covers all aspects to achieve energy optimization using latest technologies and algorithms, in wireless sensor networks. Presents various IoT and Topology Control Methods and protocols, various network models, and model simulation using MATLAB (R). Reviews methods and results of optimization with Simulation Hardware architecture leading to prolonged life of IoT networks. First time introduces bio-inspired algorithms in the IoT domain for performance optimization This book aims at Graduate Students, Researchers in Information Technology, Computer Science and Engineering, Electronics and Communication Engineering. |
You may like...
NMR Spectroscopy in the Undergraduate…
David Soulsby, Laura J. Anna, …
Hardcover
R5,483
Discovery Miles 54 830
|